Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in Bigace 1.8.2 allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[_BIGACE][DIR][admin] parameter in (a) system/command/admin.cmd.php, (b) admin/include/upload_form.php, and (c) admin/include/item_main.php; and the (2) GLOBALS[_BIGACE][DIR][libs] parameter in (d) system/command/admin.cmd.php and (e) system/command/download.cmd.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bigace | Bigace | 1.8.2 |
References
- http://securityreason.com/securityalert/1462
- http://securitytracker.com/id?1016760
- http://www.securityfocus.com/archive/1/444415/100/0/threaded
- http://www.securityfocus.com/bid/19723Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28585
- http://securityreason.com/securityalert/1462
- http://securitytracker.com/id?1016760
- http://www.securityfocus.com/archive/1/444415/100/0/threaded
- http://www.securityfocus.com/bid/19723Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28585
FAQ
What is CVE-2006-4423?
CVE-2006-4423 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple PHP remote file inclusion vulnerabilities in Bigace 1.8.2 allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[_BIGACE][DIR][admin] parameter in (a) system/comman...
How severe is CVE-2006-4423?
CVE-2006-4423 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4423?
Check the references section above for vendor advisories and patch information. Affected products include: Bigace Bigace.